OWASP Netherlands
Main Supporters Upcoming Events Past Events Resources
| Date | Name | Presentation Link |
|---|---|---|
| November 28 2024 | BeNeLux Days 2024 - Conference |
Recording |
| April 18 2024 | API Security: OWASP API Top 10 Unlocked by Erez Yalon and Paulo Silva |
Recording |
| OWASP Security Champions Guide by Cheyenne Seur |
Recording | |
| How (not) to use secrets with OWASP WrongSecrets by Ben de Haan |
Recording | |
| March 21 2024 | How to get Dev(Ops) teams to start adopting DevSecOps by Sebastiaan Rijnbout |
Presentation |
| Cracking the API: Challenges in IoT and Modern Applications by Yianna Paris |
Presentation | |
| February 15 2024 | OWASP ModSecurity: A Few Plot Twists and What Feels Like a Happy End by Christian Folini |
Recording |
| OWASP Dependency-Track by Niklas Düster |
Recording | |
| October 19 2023 | Hacking CI/CD Pipelines: Some use cases for hacking CI/CD orchestrators by Mauricio Cano |
Recording |
| Unveiling the secrets in your code: Detecting and Triaging exposed credentials at scale by Ingmar Vis |
Recording | |
| September 21 2023 | DAST in the world of DevSecOps by Amit Sharma |
Recording |
| SAST, DAST, IAST... xAST de-mystified by Martin Knobloch |
Recording | |
| June 7 2023 | Panel Discussion on Web Application Firewalls by Aatif Khan and Menno Swam and Nico van Rooyen |
Recording |
| May 25 2023 | AppSec in IT contracts by Sebastian Avarvarei |
Recording |
| About containers and their escapes: understanding escape patterns and possibilities by Mauricio Cano |
Recording | |
| April 20 2023 | OWASP Juice Shop by Björn Kimminich |
Presentation
Recording |
| The Rise of the Security Verification Standard by Josh Grossman |
Recording | |
| March 16 2023 | Crash course on the OWASP API Security Top 10 by Colin Domoney |
Presentation
Recording |
| January 19 2023 | Bootstrap and increase your software assurance with OWASP SAMM v2.1 by Sebastien Deleersnyder |
Presentation |
| September 15 2022 | The Red Cross of the Internet by Shairesh Algoe |
Recording |
| Digitally securing The Netherlands - or convincing others to do it by Koen Sandbrink |
Recording | |
| June 16 2022 | Staying in control of your cloud application landscape by Priyam Awasthy and Spandan Chandra |
Presentation
Recording |
| OWASP Cloud-Native Application Security Top 10 by Filip |
Presentation
Recording |
|
| May 19 2022 | Comparing Static Analysis Security Testing (SAST) tools en dependency scanners by Wibren Wiersma |
Recording |
| Infrastructure as Code (IaC) - security challenges and how KICS solves them by Lior Kaplan |
Recording | |
| Secret Scanning Solutions by Raluca Viziteu |
Recording | |
| April 21 2022 | Crawl Dutch government websites to collect statistics of SRI usage by Tom Stock |
Recording |
| Web Security Map (basisbeveiliging.nl) by Elger Jonker |
Recording | |
| Security Transformation Program by Dimitar Yanev and Andreas Hauke |
Recording | |
| March 17 2022 | OWASP Dependency Track and OWASP CycloneDX by Steve |
Recording |
| Software Bill of Material – why do we need it, what is it and how can we overcome the current challenges by Klaas Wijbrans |
Recording | |
| Introducing: The Security Champions Guidebook |
Recording | |
| Introducing: Guidelines on embedding SBOM in your organization |
Recording | |
| February 17 2022 | How log4j became an epic - a story told by a developer and a product owner by Rick te Brake and Anna Rudenko |
Recording |
| The Long-Term Impact of Log4j by Dan Cornell |
Recording | |
| How log4j ruined our Christmas by Owen |
Recording | |
| January 20 2022 | A story on scaling threat modeling across 500+ DevOps teams by Abhishek k. Goel |
Recording |
| Gamification of Threat Modelling by Grant Ongers |
Recording | |
| October 28 2021 | Our Secrets Management Journey: From Code to Vault by Jeroen Willemsen |
Recording |
| Doing Security in DevOps, the right way! by Irfaan Santoe |
Recording | |
| April 9 2020 | SKF news by Riccardo ten Cate and Glenn ten Cate |
Recording |
| OWASP Integration Standards project update by Rob van der Veer |
Recording | |
| June 18 2019 | Recon Recon by Martijn Baalman aka @x1m_martijn |
Recording |
| The Good, The Bad and The Ugly of Responsible Disclosure by Chrissy Morgan aka 5w0rdFish |
Recording | |
| January 17 2019 | Machine Learning vs. Cryptocoin Miners by Jonn Callahan |
Presentation
Recording |
| Running at Light Speed: Cloud Native Security Patterns by Jack Mannino |
Presentation
Recording |
|
| September 27 2018 | Serverless Security: Functions-as-a-Service (FaaS) by Niels Tanis |
Recording |
| Building A Security Test Automation Framework by Riccardo Ten Cate |
Recording | |
| June 28 2018 | Building A Security 'Culture' by Gareth O'Sullivan |
Recording |
| Building Secure Software With OWASP Tools And Guides by Martin Knobloch |
Recording | |
| October 12 2017 | Playing in the Sandbox: Bypassing Adobe Flash Input Validation by Björn Ruytenberg |
Recording |
| How to rob a bank by Pieter Ceelen |
Recording | |
| November 7 2016 | Web Security: Broken by default? by Niels Tanis |
Recording |
| Building A Software Security Program by Kuai Hinojosa |
Recording | |
| September 22 2016 | Handling Of Security Requirements In Software Development Lifecycle by Daniel Kefer and René Reuter |
Recording |
| Hacking The OWASP Juice Shop by Björn Kimminich |
Recording | |
| July 7 2016 | Find and fix software security problems… by Matias Madou |
Recording |
| How To Keep Your Secrets Safe(r) On An Android Device by Jeroen Willemsen |
Recording | |
| April 21 2016 | Web Application Firewall, Filter and Bypass by Aatif Khan |
Recording |
| February 18 2016 | OWASP Security Knowledge Framework by Glenn Ten Cate and Riccardo Ten Cate |
Recording |